vulnerability
Arch Linux: Denial of service (CVE-2020-28493)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Feb 1, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Feb 1, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue was found in python-jinja before version 2.11.3. The regular expression denial of service vulnerability is mainly due to the sub-pattern [a-zA-Z0-9._-]+.[a-zA-Z0-9._-]+ This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
Solution
arch-linux-upgrade-latest
References
- CVE-2020-28493
- https://attackerkb.com/topics/CVE-2020-28493
- URL-https://github.com/pallets/jinja/blob/ab81fd9c277900c85da0c322a2ff9d68a235b2e6/src/jinja2/utils.py%23L20
- URL-https://github.com/pallets/jinja/pull/1343
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PVAKCOO7VBVUBM3Q6CBBTPBFNP5NDXF4/
- URL-https://security.archlinux.org/ASA-202102-19
- URL-https://security.archlinux.org/ASA-202102-20
- URL-https://security.gentoo.org/glsa/202107-19
- URL-https://snyk.io/vuln/SNYK-PYTHON-JINJA2-1012994
- CWE-400
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.